Readit News logoReadit News
cedws · 2 years ago
It's not clear if the author was hired to do this pentest or is a guerilla/good samaritan. If it is indeed the latter, I wonder how they are so brazen about it. Does chattr.ai have a responsible disclosure policy?

In my eyes people should be free to pentest whatever as long as there is no intent to cause harm and any findings are reported. Sadly, many companies will freak out and get the law involved, even if you are a good samaritan.

KomoD · 2 years ago
> It's not clear if the author was hired to do this pentest or is a guerilla/good samaritan

Pretty clear to me, "it was searching for exposed Firebase credentials on any of the hundreds of recent AI startups.", running a script to scan hundreds of startups

> Sadly, many companies will freak out and get the law involved, even if you are a good samaritan.

Yeah, but that also ends with that company being shamed a lot of the time

pests · 2 years ago
What is wrong with shaming when it's warranted?
xxs · 2 years ago
Plain text passwords, seriously. At that point, I'm not sure what would be a similarity with any other engineering profession. The plain text passwords are beyond any rhyme or reason... and then returned to the end user client. If anything, I'd consider it malicious negligence - in the EU the leak would be a GDPR issue as well.
bitexploder · 2 years ago
The issue is it is often impossible to distinguish from a white hat or a black hat hacking your live systems. It can trigger expensive incident response and be disruptive to the business. Ethically, I think it crosses a line when you are wasting resources like this, live hacking systems. There is usually a pretty clear and obvious point where you can stop, not trigger IR, and notify the companies. Not saying that was the case here, but I have been doing cybersecurity assessment work for 17+ years. Even when you have permission sometimes the juice isn't worth the squeeze to keep going as you often have proven the thing you needed to or found the critical defect. There is a balance to whtie hat activities and using good sense to not waste resources.

Dead Comment

MrBruh · 2 years ago
> Good Samaritan

The web is insecure enough as it is, I just want to do my part to make it that little bit safer :)

mmsc · 2 years ago
Everybody has that goal until they get a knock on their door at 6am: https://github.com/disclose/research-threats

Deleted Comment

pharrington · 2 years ago
From one Paul to another, best of luck! For the goal of improving overall web security, widespread shame doesn't work. My hunch is that we need to be more prideful about having verifiably robust security practices. Kind of like getting corporations to realize that the data is more valuable if you can prove that nobody can breach it.
mise_en_place · 2 years ago
Either way it is a fascinating write-up. It will hopefully be a cautionary tale for other businesses and companies out there, and will inspire them to lockdown this credentialing issue. I've noticed a similar blasé attitude when implementing SSO; the devil is in the details as they say.
nigamanth · 2 years ago
Does this bug work across all applications that use Firebase? Or just those that didn't push the update with security?
cedws · 2 years ago
I salute you for it. Take caution though.

The bad guys don't play by the rules so the rules only hinder the good guys from helping. I think Internet security would be in a better position if we had legislation to protect good samaritan pentesters. Even moreso if they were appropriately rewarded.

ericalexander0 · 2 years ago
Sometimes these events provoke regulators to take a closer look at the company.

https://www.ftc.gov/news-events/news/press-releases/2023/11/...

jjeaff · 2 years ago
Do you feel the same about physical security? It's fine for people to walk around your building, peak in the windows, maybe pick the lock on the door, maybe even take a little walk inside, as long as they don't steal anything?
afterburner · 2 years ago
Weird, I don't feel nearly as touchy about some ones and zeros on a computer as I do my physical body's safety, without which I would not exist.
bastawhiz · 2 years ago
If I owned a bunch of vending machines, and someone came to me and said "Hey, I found out that if you put a credit card in the dollar bill slot, it gives out free soda and empties all its coins through the return slot," I would a.) be pleased to have been informed and b.) not be upset that they did this.

If a neighbor came to me and said, "Hey, your mailbox that's located at the end of your long dirt driveway is protected by a wafer lock that can be opened by simply slapping the side of the mailbox in a funny way," I would maybe wonder why they were slapping my mailbox but I would be grateful that they told me and I would want them to continue doing whatever weird shit they were doing (so long as it wasn't causing damage).

When you put property in a public (or practically public) space, there's an expectation that it will not be treated as though it is on private property. There's a big difference between someone jiggling the door to your home (where you physically reside) and jiggling the lock on a mall gumball machine or the handle on a commercial fire exit.

yard2010 · 2 years ago
Would you drive over a group of people with a bus? Would you do it in GTA?

There is a big difference between the digital world and the physical one. Many actions e.g stealing are very different in these 2 worlds and have very different implications.

z3phyr · 2 years ago
Communes exist. The internet is supposed to be a giant commune of researchers watching each others backs.
DirkH · 2 years ago
There's a huge fucking difference between "yo, the neighbourhood and country is unsafe and there is no strongly upheld norm here of people not seeing if they can enter someone else's house if their door is easily unlockable. You must be new here since I noticed your door is pretty insecure, I recommend you do x,y and z if you are to live here safely. Take care." Versus "yo, I just entered your home and snooped around since it was easy to lockpick. There are actually strong norms here of people not doing this so I know this is quite the social violation and something like this had a very low probability of happening otherwise but, you know, your door is weak so it was my right to enter. You should fix it btw"

The internet is like the former not the latter and taking a moral high ground stance that it just should be otherwise is just screaming underwater while doing nothing to actually protect yourself from an actual real threat.

I'd be very thankful if I moved to some place I'm unfamiliar with where people lockpicking is just a cultural norm and someone warned me I should get a better door.

Deleted Comment

devwastaken · 2 years ago
Lack of proper regulations, engineering standards, and tangible fines means that the only democracy that exists is the people themselves taking action. The corps being hacked have plenty of malicious intent, perhaps focus on that.
jimz · 2 years ago
In the American case, the interpretation of the CFAA under Van Buren (2021) would provide at least the defense that one does not violate the law if there is no meaningful authorization scheme in place to determine what constitutes "exceeds authorized access". This may sound pedantic but when reporting on the decision much of the non-specialist media seemed to have failed to appreciate that in order to determine what conduct exceeds authorized access, it's necessary to be able to determine where authorized access starts and ends in every case as a factual matter, and the courts essentially threw out the theory that one can simply use a non-technological solution (like a very broad ToS) as a backstop and require some sort of notice and specificity. I don't think the mere fact that such a technological scheme can be erected is relevant since in theory you can put in some sort of basic authorization scheme - including basic HTTP authorization - around pretty much anything accessible via the protocol, but anything beyond a showing of actually putting such an authorization scheme in place, there's no real way to determine the unimplemented intent of some company in a way with any certainty. It's Orin Kerr's "gate-up-gate-down" theory - you need to have a gate in place to start with, instead of just a space where a gate can go or the assumption where a gate should be to figure out whether the gate is up or down, and without that determination one cannot meet all of the elements required to prove a violation of the statute.

I wouldn't even consider this "hacking" really. If prosecuted a defense attorney familiar with both the technology and the admitted niche area of computer crime law can readily conduct some very effective cross-examination against whoever the state is bringing out as a witness. The government does frequently rely on the lack of tech-competent and accessible counsel as a way to exert coercion (and usually resulting in a plea), and it doesn't help that the layperson has a very difficult time figuring out what qualities constitute competency when looking for attorneys (hence the enduring popularity of jingles since being memorable is frequently mistaken for being competent), but they are out there.

KTibow · 2 years ago
The timeline omits when the article was put online
boomboomsubban · 2 years ago
According to the Wayback Machine, it first appeared January 10 2024. http://web.archive.org/web/20240000000000*/https://mrbruh.co...
MrBruh · 2 years ago
It was posted earlier today (NZ Time). If they do end up reaching out though, I will amend that part with a revised statement :)
samstave · 2 years ago
You could ostensibly make a great tool from this data for those seeking employment....

Make a tool which will look at the list of all the franchises within radius of person, and have it auto submit applications to all of them simultaneously...

not2b · 2 years ago
That can be easily deduced.
thekombustor · 2 years ago
At the time of writing, accessing the link returns a bunch of prometheus metrics... interesting.
MrBruh · 2 years ago
Shouldn't anymore, was a "pushing to production" moment. I wanted analytics since my site was getting flooded \w traffic.
user3939382 · 2 years ago
Are you not concerned with the CFAA?
yieldcrv · 2 years ago
does this count as authorized access under CFAA?

I’m curious what the limits are

Deleted Comment

ysofunny · 2 years ago
then again, the people in potential harm's way seem to be the poor sods trying to get hired by these companies for a meager hourly wage

I don't see how this "p0wns" the companies themselves

sampli · 2 years ago
If you view this page in Safari, it’s just a text document
MrBruh · 2 years ago
It is using the Avif format (for images) for a 2x compression bonus over PNG while still maintaining a higher quality over JPG.

If you can't view the images then it means you are likely using an outdated browser, all current versions of browsers support it (afaik) except Internet Explorer.[0]

...And if you are using Internet Explorer, then god help you.

[0] https://caniuse.com/avif

novagameco · 2 years ago
I'm on Edge 120 (released a month ago) and can't see it
frakkingcylons · 2 years ago
I'm not seeing it that way on Safari 16.1 on mac.
black3r · 2 years ago
Since this is a post about security, this is your daily reminder to update your browser to stay safe on the internet. Up-to-date versions of Safari support AVIF images, and there have been multiple RCE vulnerabilities with known exploits fixed last year in Safari...

Deleted Comment

hospitalJail · 2 years ago
iphones are the scariest device to do anything important on.

I had a moment of total freakout when I realized the person across from me at lunch had an iPhone on the table. Actually he had an Android, and we continued talking like no big deal.

To be clear, we were talking about a 10-100M dollar problem, this wasnt small potatoes.

Too many exploits, I can't imagine having anything of value on an iphone.

hazebooth · 2 years ago
i love the picture of your cat on the home page :)
MrBruh · 2 years ago
That's my lovely cat, Jingles. She is getting a bit old so I thought I would immortalize her on the homepage of my site.